2018
DOI: 10.1155/2018/4680867
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment

Abstract: Fog computing, as the supplement of cloud computing, can provide low-latency services between mobile users and the cloud. However, fog devices may encounter security challenges as a result of the fog nodes being close to the end users and having limited computing ability. Traditional network attacks may destroy the system of fog nodes. Intrusion detection system (IDS) is a proactive security protection technology and can be used in the fog environment. Although IDS in tradition network has been well investigat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
49
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 102 publications
(49 citation statements)
references
References 14 publications
0
49
0
Order By: Relevance
“…Four existing classification algorithms are selected to build classification models for intrusion detection using packet header information. These include: Classification and Regression Trees (Peng, et al, 2018), Support Vector Machine (Jha & Ragha, 2013), Naïve Bayes (Panda & Patra, 2007), and k-Nearest Neigbour (Liao & Vemuri, 2002).…”
Section: Methodsmentioning
confidence: 99%
“…Four existing classification algorithms are selected to build classification models for intrusion detection using packet header information. These include: Classification and Regression Trees (Peng, et al, 2018), Support Vector Machine (Jha & Ragha, 2013), Naïve Bayes (Panda & Patra, 2007), and k-Nearest Neigbour (Liao & Vemuri, 2002).…”
Section: Methodsmentioning
confidence: 99%
“…Full KDDCup1999 dataset has been used to test the proposed model. Peng et al [9] used classification machine learning technique. The authors proposed an IDS system based on decision tree over Big Data in Fog Environment.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, because the MEC can be seen as a network of multiple nodes, the assessment of node importance [117] and the assessment of invulnerability [118] of MEC also needs to be investigated. In our previous research [119], an Intrusion Detection System (IDS) was developed based on decision tree. Firstly, we developed a preprocessing algorithm to digitize the strings in the given dataset and then normalized the whole data.…”
Section: Other Issuesmentioning
confidence: 99%